🔥 Trending CVEs - Last 90 Days
4,459 critical and high-severity vulnerabilities discovered in the last 90 days. Stay ahead of emerging threats with real-time CVE tracking and instant security alerts.
Critical & High-Risk CVEs
A denial-of-service vulnerability exists in RustCrypto's SM2 public-key encryption implementation where untrusted ciphertext can trigger bounds-check ...
📅 64 days ago • Jan 10, 2026This vulnerability in Yonyou YonBIP allows attackers to bypass normal directory restrictions via path traversal in the LoginWithV8 interface, potentia...
📅 64 days ago • Jan 9, 2026A vulnerability in Hero Motocorp Vida V1 Pro 2.0.7 allows local attackers to cause denial of service via the Bluetooth Low Energy (BLE) component. Thi...
📅 64 days ago • Jan 9, 2026FluidSynth versions 2.4.6 and earlier contain a null pointer dereference vulnerability in fluid_synth_monopoly.c that can be triggered by loading a sp...
📅 64 days ago • Jan 9, 2026Vivotek IP7137 cameras with firmware version 0200a allow unauthenticated access to live RTSP video feeds on port 8554. This affects all users of these...
📅 64 days ago • Jan 9, 2026This CVE describes an unauthenticated SQL injection vulnerability in Zenitel products that allows attackers to inject SQL queries via GET request para...
📅 64 days ago • Jan 9, 2026This vulnerability allows external applications to bypass security controls and directly launch Gmail with inbox access by exploiting an exported Acti...
📅 65 days ago • Jan 8, 2026This vulnerability in OPEXUS eComplaint allows unauthenticated attackers to download sensitive files by guessing predictable charge numbers. It affect...
📅 65 days ago • Jan 8, 2026This CVE describes a PHP Local File Inclusion vulnerability in the G5Theme Handmade Framework WordPress plugin. Attackers can include arbitrary local ...
📅 65 days ago • Jan 8, 2026A vulnerability in Technitium DNS Server v13.5 allows remote attackers to trigger a denial of service condition by exploiting the rate-limiting compon...
📅 65 days ago • Jan 8, 2026This vulnerability in Insiders Technologies GmbH e-invoice pro allows remote attackers to cause denial of service via crafted scripts. The issue affec...
📅 65 days ago • Jan 8, 2026Mastodon's IP address filtering mechanism had incomplete coverage, allowing attackers to bypass protections against local network requests. This enabl...
📅 65 days ago • Jan 8, 2026CoreDNS servers running gRPC, HTTPS, or HTTP/3 protocols are vulnerable to denial-of-service attacks due to missing resource limits. Unauthenticated a...
📅 65 days ago • Jan 8, 2026A NULL pointer dereference vulnerability in Trend Micro Apex Central allows remote attackers to cause denial-of-service without authentication. This a...
📅 65 days ago • Jan 8, 2026An out-of-bounds read vulnerability in Trend Micro Apex Central allows remote attackers to cause denial-of-service conditions without authentication. ...
📅 65 days ago • Jan 8, 2026This vulnerability in the BulletProof Security WordPress plugin allows attackers to retrieve embedded sensitive data through information insertion int...
📅 65 days ago • Jan 8, 2026This path traversal vulnerability in the VidMov WordPress theme allows attackers to access files outside the intended directory using '.../...//' sequ...
📅 65 days ago • Jan 8, 2026This CVE describes a command injection vulnerability in pnpm package manager versions 6.25.0 through 10.26.2. Attackers who can control environment va...
📅 66 days ago • Jan 7, 2026This vulnerability in urllib3 allows a malicious server to cause excessive resource consumption on clients through decompression bombs in HTTP redirec...
📅 66 days ago • Jan 7, 2026A stack-based buffer overflow vulnerability in libtasn1 v4.20.0 allows attackers to execute arbitrary code or cause denial of service by exploiting im...
📅 66 days ago • Jan 7, 2026This CVE allows attackers to serve malicious code through HTTP tarball dependencies in pnpm packages. The lockfile fails to provide integrity verifica...
📅 66 days ago • Jan 7, 2026This CVE describes an uncontrolled format string vulnerability in Panda3D's egg-mkfont tool. Attackers can exploit the -gp command-line option to read...
📅 66 days ago • Jan 7, 2026This path traversal vulnerability in MediaWiki's CSS extension allows attackers to read arbitrary files on the server by manipulating file paths. It a...
📅 66 days ago • Jan 7, 2026OpenAirInterface CN5G AMF versions up to v2.0.1 contain a logical error in JSON request processing that allows unauthenticated remote attackers to sen...
📅 66 days ago • Jan 7, 2026CVE-2025-67364 is a critical path traversal vulnerability in fast-filesystem-mcp version 3.4.0 that allows attackers to bypass directory access restri...
📅 66 days ago • Jan 7, 2026CVE-2025-67366 is a critical path traversal vulnerability in @sylphxltd/filesystem-mcp v0.5.8 that allows attackers to bypass directory restrictions u...
📅 66 days ago • Jan 7, 2026OpenAirInterface CN5G AMF versions up to v2.1.9 have a buffer overflow vulnerability when processing NAS messages with overly long IMSI strings. Unaut...
📅 66 days ago • Jan 7, 2026The Reviewify WordPress plugin has an authorization vulnerability that allows authenticated users with Contributor-level access or higher to create ar...
📅 66 days ago • Jan 7, 2026The Yoco Payments WordPress plugin contains a path traversal vulnerability that allows unauthenticated attackers to read arbitrary files on the server...
📅 66 days ago • Jan 7, 2026This vulnerability in the Latest Registered Users WordPress plugin allows unauthenticated attackers to export complete user data (excluding passwords)...
📅 66 days ago • Jan 7, 2026The User Activity Log WordPress plugin up to version 2.2 contains an unauthenticated vulnerability that allows attackers to modify critical WordPress ...
📅 66 days ago • Jan 7, 2026This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affec...
📅 67 days ago • Jan 6, 2026This CVE describes a PHP Local File Inclusion vulnerability in the VanKarWai Calafate WordPress theme. Attackers can include arbitrary local files thr...
📅 67 days ago • Jan 6, 2026CVE-2025-59379 is a blind SQL injection vulnerability in DwyerOmega Isensix ARMS 1.5.7 that allows attackers to extract sensitive database information...
📅 67 days ago • Jan 6, 2026CVE-2026-21507 is an infinite loop vulnerability in the CalcProfileID function of iccDEV's IccProfile.cpp. This allows attackers to cause denial of se...
📅 68 days ago • Jan 6, 2026This vulnerability in AIOHTTP allows denial-of-service attacks when Python optimizations are enabled and the application processes POST requests. Atta...
📅 68 days ago • Jan 6, 2026This vulnerability in AIOHTTP allows attackers to craft malicious requests that cause uncontrolled memory consumption in servers using Request.post() ...
📅 68 days ago • Jan 6, 2026AIOHTTP versions 3.13.2 and below are vulnerable to a zip bomb denial-of-service attack. An attacker can send specially crafted compressed requests th...
📅 68 days ago • Jan 5, 2026This CVE describes a path traversal vulnerability in Frappe web framework that allows attackers to read arbitrary files from the server due to insuffi...
📅 68 days ago • Jan 5, 2026CVE-2025-68428 is a path traversal vulnerability in jsPDF's Node.js builds that allows attackers to read arbitrary local files when user-controlled in...
📅 68 days ago • Jan 5, 2026This CVE describes a regular expression denial of service (ReDoS) vulnerability in Anthropic's MCP TypeScript SDK. Attackers can exploit this by sendi...
📅 68 days ago • Jan 5, 2026An unauthenticated Denial of Service vulnerability in evershop allows attackers to crash application servers by sending specially crafted SVG image re...
📅 68 days ago • Jan 5, 2026A vulnerability in Samsung Exynos processors allows incorrect handling of RRC (Radio Resource Control) packets, leading to denial of service. This aff...
📅 68 days ago • Jan 5, 2026This Cross-Site Scripting (XSS) vulnerability in the UCRM Argentina AFIP invoices Plugin allows attackers to execute malicious scripts in administrato...
📅 68 days ago • Jan 5, 2026MessagePack for Java versions before 0.9.11 contain a denial-of-service vulnerability where deserializing malicious .msgpack files with specially craf...
📅 71 days ago • Jan 2, 2026This authentication bypass vulnerability in Revotech I6032W-FHW devices allows attackers to access sensitive information and escalate privileges witho...
📅 71 days ago • Jan 2, 2026Vatilon v1.12.37-20240124 transmits user credentials in plaintext during authentication, allowing attackers to intercept login information. This affec...
📅 71 days ago • Jan 2, 2026This directory traversal vulnerability in Vatilon v1.12.37-20240124 allows attackers to access sensitive files and directories outside the intended we...
📅 71 days ago • Jan 2, 2026This CVE-2025-9110 vulnerability allows remote attackers to read sensitive system information from affected QNAP devices without authorization. Attack...
📅 71 days ago • Jan 2, 2026An integer underflow vulnerability in gpsd's NAVCOM packet parser causes a denial of service condition. When processing malicious packets, the parser ...
📅 71 days ago • Jan 2, 2026Why Track Trending CVEs?
Stay ahead of emerging threats: Newly discovered vulnerabilities pose the highest risk as attackers race to exploit them before patches are deployed. Trending CVEs represent the most critical security issues requiring immediate attention from security teams worldwide.
Prioritize remediation efforts: With thousands of CVEs published annually, security teams need to focus on the most recent and severe threats first. Our trending CVE dashboard highlights critical and high-severity vulnerabilities from the past 7, 30, or 90 days, helping you prioritize patching efforts.
🚀 Automated Trending CVE Monitoring
- Scan your servers to detect packages affected by trending CVEs
- Receive instant email alerts when critical vulnerabilities are discovered
- Dashboard shows CVE age, severity, CVSS scores, and affected systems
- Filter by time period (7/30/90 days) to focus on recent threats